Custom Query (1818 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1818)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted nickm project High Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some accepted nickm enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned nickm enhancement High Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted nickm defect High Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts reopened defect High Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20647 Run chutney tests in Jenkins or Travis assigned enhancement High Tor: 0.4.1.x-final
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted nickm task High Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision nickm task High Tor: unspecified
#21377 DirAuths should expose bwauth bandwidth files needs_revision juga enhancement High Tor: 0.4.1.x-final
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21509 Fuzz v3 hidden services accepted nickm task High Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new nickm defect High Tor: unspecified
#22422 Add noise to PaddingStatistics needs_information mikeperry defect High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler accepted dgoulet defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge new dgoulet defect High Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned ahf project High Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned mikeperry defect High Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.1.x-final
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) accepted nickm defect High Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned dgoulet defect High Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen accepted dgoulet defect High Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: 0.4.0.x-final
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision nickm defect High Tor: unspecified
#28018 Improve accuracy and usefulness of information reported to controllers about bootstrap status assigned catalyst enhancement High Tor: unspecified
#28140 Our circuit died due to an invalid selected path if switching to plugabble transports needs_information defect High Tor: unspecified
#28183 tor-0.3.5.3_alpha unexpected stop bug: (Sandbox) Caught a bad syscall attempt (syscall shutdown) needs_information nickm defect High Tor: 0.3.4.x-final
#28223 Unparseable microdescriptor on public relay new defect High Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect High Tor: 0.3.5.x-final
#28244 Followup tasks for Rust asan CI fixes new defect High Tor: unspecified
#28356 DataDirectoryGroupReadable and CacheDirectoryGroupReadable conflicts forcing sandboxed Tor to crash assigned defect High Tor: unspecified
#28638 Serialize state machines in the torrc new defect High Tor: unspecified
#28679 Bridge connections on startup new enhancement High Tor: unspecified
#28693 Add an option to disable circuit padding reopened defect High Tor: unspecified
#28804 Add circuit padding to padding-spec.txt and write a doc for researchers new defect High Tor: unspecified
#28849 Handle dormant mode in process library and for PT's new enhancement High Tor: unspecified
#28925 distinguish PT vs proxy for real in bootstrap tracker needs_review catalyst defect High Tor: 0.4.0.x-final
#28966 HSv3 client auth insufficiently documented (was: HiddenServiceAuthorizeClient incompatible) assigned asn defect High Tor: 0.4.1.x-final
#28970 tor_bug_occurred_(): Bug: ../src/or/hs_client.c:624: setup_intro_circ_auth_key: Non-fatal assertion needs_information asn defect High Tor: 0.4.0.x-final
#29034 circuit: Cleanup an HS circuit when it is being re-purposed assigned mikeperry defect High Tor: 0.4.0.x-final
#29036 Coverage merge failures cause test_process_slow stderr check to fail needs_review ahf defect High Tor: 0.4.1.x-final
#29136 PT_LOG and PT_STATUS event fields unspecifed assigned ahf defect High Tor: 0.4.0.x-final
#29241 NSS SSL_ExportKeyingMaterial failing accepted nickm defect High Tor: 0.4.0.x-final
#29280 Use Chutney for CI needs_revision task High Tor: 0.4.1.x-final
#29494 Optimize interaction between circuitmux and circuitpadding assigned mikeperry enhancement High
#29500 Broken circuitpadding unittests on appveyor needs_revision mikeperry defect High Tor: 0.4.0.x-final
#29527 Division by zero: undefined behaviour in circuitpadding/circuitpadding_sample_distribution test needs_review teor defect High Tor: 0.4.0.x-final
#29583 HSv3: Faulty cross-certs in introduction point keys (allows naive onionbalance for v3s) new defect High Tor: 0.4.1.x-final
#29665 hs: circuit_expire_old_circuits_serverside() should check for RP circuits merge_ready defect High Tor: 0.3.5.x-final
#29669 hs: ADD_ONION with NEW:BEST is still pinned on v2 new defect High Tor: 0.4.1.x-final
#29691 Builds from master fail on Jenkins mingw builder assigned ahf defect High Tor: 0.4.0.x-final
#29693 Decrease probability of stochastic failures in test-slow merge_ready asn defect High Tor: 0.4.0.x-final
#29792 practracker problems and CI broken on master new defect High Tor: 0.4.1.x-final
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline assigned mikeperry defect Medium Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information nickm defect Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned mikeperry enhancement Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.